The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2020
DOI: 10.1109/access.2020.2969252
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Data Hiding in Encrypted Images With Dual Data Embedding

Abstract: Typical reversible data hiding in encrypted image (RDH-EI) methods merely embed data in the encrypted domain, ignoring the requirement of the image owner for data embedding. To address this issue, this paper proposes a novel RDH-EI method with dual data embedding based on generalized integer transformation (GIT). The image owner first vacates embedding room, and performs data embedding before image encryption. After data encryption, the remote server utilizes the vacated room to further embed additional data i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 49 publications
1
11
0
Order By: Relevance
“…Selfembedding refers to embedding a portion of data into its data during the preprocessing stage before encryption rather than during the data embedding stage. To reserve space, data self-embedding was performed on a cover image during the preprocessing step of work [27]. Before image encryption, error correction data were generated through preprocessing and reversibly embedded into the down-sampling pixels of the original cover image.…”
Section: Data Self-embeddingmentioning
confidence: 99%
See 1 more Smart Citation
“…Selfembedding refers to embedding a portion of data into its data during the preprocessing stage before encryption rather than during the data embedding stage. To reserve space, data self-embedding was performed on a cover image during the preprocessing step of work [27]. Before image encryption, error correction data were generated through preprocessing and reversibly embedded into the down-sampling pixels of the original cover image.…”
Section: Data Self-embeddingmentioning
confidence: 99%
“…The joint algorithms must perform data extraction and cover decryption according to the designed order. To achieve true reversibility and separability, the two operations must be completed without errors, such as in [7][8][9][10][11][12][13][14]27,36], etc. Separable algorithms have more flexibility.…”
Section: The Cover Image Decryptionmentioning
confidence: 99%
“…RDH-ED methods can be broken down into two main categories: Reserving Room Before Encryption (RRBE) [1][2][3][4], and Vacating Room After Encryption (VRAE) [5][6][7]. In RRBE methods, the content owner liberates space for the data in the media in a preprocessing step.…”
Section: Introductionmentioning
confidence: 99%
“…However, most of the reversible data hiding schemes have extremely low embedding capability. In this case, a lot of reversible data hiding algorithms [22][23][24][25][26][27][28][29][30][31][32][33] were proposed for encrypted images to increase the embedding capability; meanwhile, keeps high fidelity. However, embedding secret data in a meaningless image deviate from the essence of steganography.…”
Section: Introductionmentioning
confidence: 99%